Which of the following attacks does a hacker perform in order to obtain UDDI information
such as business Entity, busines Service, binding Template, and tModel?
A.
Web Services Footprinting Attack
B.
Service Level Configuration Attacks
C.
URL Tampering Attacks
D.
Inside Attacks
Explanation:
Reference:
http://www.scribd.com/doc/184891017/CEHv8-Module-13-Hacking-WebApplicationspdf(page 99)
A = See ECSA V8, see M-16/P-589